Security In Computing
Contamination of information
Valuable information may become worthless if unauthorized information is mixedwith it. The damage may be as great as the damage through information disclosure.
Unauthorized use of resources
Unauthorized use of resources may lead to destruction, modification, loss of integrityetc. of resources and thus the authorization of individual users will be limited.
Misuse of resources
Authorized use of resources may give authorized individuals the opportunity to perform activities that are harmful to the organization. Misuse of resources,intentional or accidental, may be harmful to the organization through corruption,destruction, disclosure, loss or removal of resources. Such misuse may affect theliability of an organization for information entrusted to it or for transactions andinformation exchanged with other organizations.
Unauthorized information flow
In a distributed system, information flow must be controlled not only between users of end-systems but also between end-systems. Depending on the prevailing security policy information flow restrictions may be applied to the basis of classification of data objects and end-systems, user clearances, etc.
Repudiation of information flow
Repudiation of information flow involves denial of transmission or receipt of messages. Since such messages may carry purchasing agreement, instructions for payment etc., the scope for criminal repudiation of such messages is considerable.
Denial of service
Because of the wide range of services performed with the aid of computer systems,denial of service may significantly affect the capability of a user organization to2